Select Language  
Book's Detail
Information and Communication Technology: Second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014. Proceedings

This book constitutes the refereed proceedings of the Second IFIP TC 5/8 International Conference on Information and Communication Technology, ICT-Eur Asia 2014, with the collocation of Asia ARES 2014 as a special track on Availability, Reliability and Security, held in Bali, Indonesia, in April 2014. The 70 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers have been organized in the following topical sections: applied modeling and simulation; mobile computing; advanced urban-scale ICT applications; semantic web and knowledge management; cloud computing; image processing; software engineering; collaboration technologies and systems; e-learning; data warehousing and data mining; e-government and e-health; biometric and bioinformatics systems; network security; dependable systems and applications; privacy and trust management; cryptography; multimedia security and dependable systems and applications.

Statement of Responsibility
Author(s) Linawati - Personal Name
Made Sudiana Mahendra - Personal Name
Erich J. Neuhold - Personal Name
A Min Tjoa - Personal Name
Ilsun You - Personal Name
Edition
Call Number [PRO-TIF-006]
Subject(s) Information and Communication Technology
Language English
Publisher
Publishing Year
Specific Detail Info Table of contents : Front Matter....Pages - The Human Face of Mobile....Pages 1-20 Knowledge Management: Organization Culture in Healthcare Indonesia....Pages 108-118 Semantic Versioning of In-Process Scientific Document ....Pages 119-128 Towards Semantic Mashup Tools for Big Data Analysis....Pages 129-138 Acceptance and Use of Information System: E-Learning Based on Cloud Computing in Vietnam....Pages 139-149 Requirements Identification for Migrating eGovernment Applications to the Cloud....Pages 150-158 A GPU-Based Enhanced Genetic Algorithm for Power-Aware Task Scheduling Problem in HPC Cloud....Pages 159-169 Ball Distance Estimation and Tracking System of Humanoid Soccer Robot....Pages 170-178 Image Clustering Using Multi-visual Features....Pages 179-189 A Robust Visual Object Tracking Approach on a Mobile Device....Pages 190-198 Agent-Based Methods for Simulation of Epidemics with a Low Number of Infected Persons....Pages 21-28 Cellular Automata Model of Urbanization in Camiguin, Philippines....Pages 29-35 A Flexible Agent-Based Framework for Infectious Disease Modeling....Pages 36-45 Transformation of Digital Ecosystems: The Case of Digital Payments....Pages 46-55 Do Personality Traits Work as Moderator on the Intention to Purchase Mobile Applications Work? - A Pilot Study....Pages 56-65 Intelligent Method for Dipstick Urinalysis Using Smartphone Camera....Pages 66-77 Self-generating Programs – Cascade of the Blocks....Pages 199-212 Empirical and Computational Issues of Microclimate Simulation....Pages 78-85 A Distributed Generic Data Structure for Urban Level Building Data Monitoring....Pages 86-95 Toward a Data-Driven Performance-Guided Urban Decision-Support Environment....Pages 96-107 A Bioinformatics Workflow for Genetic Association Studies of Traits in Indonesian Rice....Pages 356-364 Fuzzy Logic Weight Estimation in Biometric-Enabled Co-authentication Systems....Pages 365-374 Hybridization of Haar Wavelet Decomposition and Computational Intelligent Algorithms for the Estimation of Climate Change Behavior....Pages 238-247 An Improved Ant Colony Matching by Using Discrete Curve Evolution....Pages 248-256 A Novel Approach to Gasoline Price Forecasting Based on Karhunen-Loève Transform and Network for Vector Quantization with Voronoid Polyhedral....Pages 257-266 Understanding eParticipation Services in Indonesian Local Government....Pages 328-337 Document Tracking Technology to Support Indonesian Local E-Governments....Pages 338-347 Modern Framework for Distributed Healthcare Data Analytics Based on Hadoop....Pages 348-355 Enhancing the Use of Digital Model with Team-Based Learning Approach in Science Teaching....Pages 267-276 Improving Reusability of OER....Pages 277-285 Online Learning for Two Novel Latent Topic Models....Pages 286-295 An Infinite Mixture Model of Generalized Inverted Dirichlet Distributions for High-Dimensional Positive Data Modeling....Pages 296-305 On If-Then Multi Soft Sets-Based Decision Making....Pages 306-315 Predicting Size of Forest Fire Using Hybrid Model....Pages 316-327 State Machine Abstraction Layer....Pages 213-227 Concern Based SaaS Application Architectural Design....Pages 228-237 A Real-Time Intrusion Detection and Protection System at System Call Level under the Assistance of a Grid....Pages 375-385 A Hybrid System for Reducing Memory and Time Overhead of Intrusion Detection System....Pages 386-395 LDFGB Algorithm for Anomaly Intrusion Detection....Pages 396-404 Assets Dependencies Model in Information Security Risk Management....Pages 405-412 Creation of Assurance Case Using Collaboration Diagram....Pages 413-418 Using Model Driven Security Approaches in Web Application Development....Pages 419-431 An Evaluation of Argument Patterns Based on Data Flow....Pages 432-437 A Design of Web Log Integration Framework Using NoSQL....Pages 438-445 Motivation-Based Risk Analysis Process for IT Systems....Pages 446-455 Formalizing Information Flow Control in a Model-Driven Approach....Pages 456-461 Security Assessment of Computer Networks Based on Attack Graphs and Security Events....Pages 462-471 A Pipeline Optimization Model for QKD Post-processing System....Pages 472-481 Aggregation of Network Protocol Data Near Its Source....Pages 482-491 The Mediating Role of Social Competition Identity Management Strategy in the Predictive Relationship between Susceptibility to Social Influence, Internet Privacy Concern, and Online Political Efficacy....Pages 492-499 Formal Security Analysis and Performance Evaluation of the Linkable Anonymous Access Protocol....Pages 500-510 On Safety of Pseudonym-Based Location Data in the Context of Constraint Satisfation Problems....Pages 511-520 Advanced Techniques for Computer Sharing and Management of Strategic Data....Pages 521-525 On the Modelling of the Computer Security Impact on the Reputation Systems....Pages 526-531 Efficient Variant of Rainbow without Triangular Matrix Representation....Pages 532-541 Efficient Lattice HIBE in the Standard Model with Shorter Public Parameters....Pages 542-553 Security Analysis of Public Key Encryptions Based on Conjugacy Search Problem....Pages 554-563 Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme....Pages 564-575 An Algorithm to Analyze Non-injective S-Boxes....Pages 576-585 Attribute-Based Fine-Grained Access Control with User Revocation....Pages 586-595 A Full Privacy-Preserving Scheme for Location-Based Services....Pages 596-601 Implementation of Efficient Operations over GF (2 32 ) Using Graphics Processing Units....Pages 602-611 M-SRS: Secure and Trustworthy Mobile Service Review System Based on Mobile Cloudlet....Pages 612-621 High-Quality Reversible Data Hiding Approach Based on Evaluating Multiple Prediction Methods....Pages 622-632 Steganalysis to Data Hiding of VQ Watermarking Upon Grouping Strategy....Pages 633-642 Experimental Evaluation of an Algorithm for the Detection of Tampered JPEG Images....Pages 643-652 A Semantic-Based Malware Detection System Design Based on Channels....Pages 653-662 An Efficient Semantic-Based Organization and Similarity Search Method for Internet Data Resources....Pages 663-673 Efficient DVFS to Prevent Hard Faults for Many-Core Architectures....Pages 674-679 Improving Availability through Energy-Saving Optimization in LEO Satellite Networks....Pages 680-689 An Effective Cloud-Based Active Defense System against Malicious Codes....Pages 690-695 Back Matter....Pages -
File Attachment
LOADING LIST...
Availability
LOADING LIST...